Search This Blog

Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

20140526

If a Murder-Suicide Serial Killing is Domestic Terrorism, Then So is Child Abuse (Satire)

It's ironic that President Obama used the term "domestic terrorist" to describe the murder-suicide serial killer that killed women his age because he was a virgin. Yet he has never called a single pedophile a "terrorist" but may have used other code words like "monster".

IDK if a pedophile terrorizes children for years, that's a form of terrorism that is worse than what the deceased Rodger did to seven female victims. The harm is partially perpetrated by society when justice takes its time to gather evidence rather than acting to prevent it.

I know of children so scarred for life that they need strong medication to remain sedated and relatively harmless to self and others.

However, pedophilia is not always restricted to religionists but also occurs when a person with power and control over children puts his need to control others supposedly in his protection at risk. Thus, child soldiers may be considered possible victims of pedophiles. The child wives in primitive communities might also be victims.

Thankfully not everyone is on a power trip and clear heads do detect and give evidence against pedophiles.

Nobody has the right to abuse in any shape or form children. This includes cybersex. It is not loving to expose children to adult-orient chatter.

Be wary.

Report inappropriate content online but ask for GooglePlus to monitor them before shutting them down to complete a list of associates who prey on children.

As well, enable logs on Hangouts and archive evidence for GooglePlus when a pedophile appears. The evidence will support your case not the perpetrator.

Even pedophilia must be considered a terrorist act too, if the Rodgers serial killings are considered by the President of the US to be a form of domestic terrorism.

If spying on private citizens is a form of State terrorism, then abusing children is an act of terrorism against the safety and security of children.

Apart from that, I urge caution since one person's obscenity is another person's erotica. Applying an arbitrary rule that criminalizes erotica puts consumers of erotica in conflict with on-line anti-obscenity "mobs" and does violate freedom of speech.

This is why the NSFW adult communities have it right when they maintain an invitation only policy towards prospective members and a zero-tolerance towards images depicting children. It cannot be assumed that everyone is 18 and over. Instead, everything should be monitored and reported.

Let us rid the Internet of the domestic terrorists who terrorize children, be they pedophiles, child abusers and their ilk, through legal means, even if it leads to more close monitoring by authorities including the CIA, the FBI, the NSA and your local police.

Only through secure monitoring are we truly free.

Reference:

2014 Isla Vista Killings: http://en.wikipedia.org/wiki/2014_Isla_Vista_killings

20140316

Cell Phone Safety and Security (satire)

Statutory rape laws may be seen as sexist when they protect good girls and promote chastity. However, they punish bad girls and sex-positive minors who tend to be a growing minority among technology-savvy children.

In Canada, sexual assault is a broad term covering everything from rape to sexual blackmail, especially in the case of Amanda Todd.

Yet the RCMP concluded that, because she consented, that there was no crime committed against Amanda since she was over the age of consent. However, there is legislation pending that would make it illegal to bullying or harass anyone online. Yet most of the bullying and harassment was actually done by her peers.

Of course, they are going to let the police entrap people online to enforce it. So I expect a lot of Canadian Charter of Rights and Freedoms challenges to this legislation once the Conservative government pushes it through.

In anticipation of the anti-bullying legislation becoming law in Canada, I urge everyone to secure your private phone calls both voice and text.

Currently I endorse Red Phone and Textsecure, even though I have yet to use them. Both products add a layer of security on top of texts and voice phone calls that is sorely lacking. Most cell phone calls and text messages can be decrypted since the encryption is weak. The only problem is, if you forget your password, then you have to reinstall Textsecure.

Reference:

Red Phone and Textsecure for Android:
https://whispersystems.org

20130729

An Open Letter to CSIS

Dear CSIS

Since you are monitoring my smartphone and my computer via metadata and email as part of a Canadian security act, it's your obligation to keep me safe from harm.

I know you know where I live. The purpose of Big Brother is not just to spy on me to protect national security; it's also to protect each citizen who submits to such scrutiny from harm.

This is what Section 7 of the Canadian Charter of Rights and Freedoms legally obligates the Government of Canada to do: the right to life, liberty, and security of the person. As part of the Canadian government, that too is part of your mandate.

That's what we pay our taxes for.

20130605

I'm the Face of the Working Poor

My wage is $2.50 more than the $10/hour minimum wage for BC Canada, which means I'm not even median. $16/hour is median.

However, my job is seasonal. To keep a roof over my head, I also get a monthly PWD Income Assistance similar to US SSI due to workplace injury in 2004.

That's about $740/month. Because my work is seasonal, it usually never is above $9600/year. As well, Social Services has me on the $9600/year season worker option. So far I've earned about $1200 as of June 2013. The best times are yet to come for me — July and August are ideal for concerts.

Oh, and if I worked a full-time job in my field, the stress would worsen the side effects of my work related injury which is a concussion. The side effects include insomnia leading to mania and risk of psychosis. There may be a risk for PTSD symptoms depending on the time I work (graveyard shifts cause hypervigilance).

What's my occupation? Security guard. Though my particular forté is crowd management. We're the security guards who are found at music concerts interacting with the crowd behind the security fence at stage front.

Our job is basically to ensure the safety and security of fans and their bands.

20121203

TIPS TO SECURE YOUR NETWORK



1) DESIGNATE YOUR IT PERSON
You need one person who knows how to secure your network, whether
s/he is the only one who knows what packet inspection means or you
already budgeted for your IT person.

2) WRITE UP A SECURITY POLICY FOR YOUR NETWORK
This policy has to state clearly what your employees may and may
not share with the rest of the world. This should cover what they may
download and how their business email address will look like, as well
as whether you have a VPN for them to access company data from
home.

3) BUY A FIREWALL THAT IS SET UP TO INSPECT PACKETS
if you don't know what that means, then ask your designated IT person.
Block P2P unless your company is a P2P service, All IMs like AIM, LiveChat,
YahooChat, etc. need to be blocked, too. Social media that is to be blocked or be
checked for rogue ActiveX and Javascript applets: Facebook. Social media that's
usually benign: Twitter, GooglePlus (replace Internet Explorer with Chrome)

4) AUTOMATE A NIGHTLY VIRUS SCAN OF ALL COMPUTERS ON YOUR
NETWORK.
This means worker's network access should be scheduled for 6AM to
10 PM. Set the scan on all the computers to 1AM. The antivirus software should be
able to report to the network server and store the results for each computer.

5) AUTOMATE BACKUPS FOR WEEKLY BACKUPS.
Backup to tape drives, and use the software that comes with it to
do a backup of the file server. Schedule this for 2AM to back
up in increments to the tape drive.


6) PREPARE FOR POWER OUTAGES
That means a UPS for the file server (200 W), and a UPS for every five
workstation (500 W) or ten (1 kW) assuming each workstation and monitor consumes
100 Watts. YMMV

7) IF MOST OF YOUR STAFF KNOW HOW TO USE A BROWSER AND OFFICE SOFTWARE, THEN
IT IS EASY TO UPGRADE TO LINUX
Consider Fedora 17. IF you buy a license for it, you get free support.
SELinux and Open

20121130

Heightened Security Risks Invasion of Privacy

Even the Broadwell-Petraeus fiasco in the US demonstrates how privacy concerns are ignored when security is risked.

This has been going on for some times prior to 9-11.

The last time I visited my hometown in Aldergrove, at the town corner of 272 St and Fraser Hwy, there are two cameras. One is a hi def camera to record license plates of vehicles going west and north.

There also is a pedestrian camera near the north west corner. You can tell this is a pedestrian camera as it is not as large as the hi def camera.

Closer to home, at 72 Ave on Scott Rd, there are two pedestrian camera for east west and north south traffic.

There are also cameras at Scott Rd and Nordel Way.

Overall, I'd feel safer if we had peace officers on foot. Tho that practice was done away with after the assaults and killings of foot police circa 1950 and before.

As well, there is no guarantee a policeman walking the beat is more law abiding than the average citizen is.

Read the history about Vancouver police, Edmonton police, and Winnipeg police.

Overall, a Christian belonging to a conservative denomination (Baptists ) is less likely to be corrupt than a policeman.

However, Jehovah Witnesses are more likely to have dealt with adultery, drug abuse, and fraternizing with prostitutes in their history; this may also be true of all denominations where most of the people who report Christian as their badge of spirituality do not pray daily and only go to church once a week i.e. nominally Christian).

It also depends on whether the person is from the country or lived in cities. Corruption depends on your willingness to condone crime in the city in fear of your life, and likewise, your willingness to report crime in the town because it's what anyone believes in his smalltown believes.

20101018

I feel Vindicated about My Decision Not to Ignore FACEBOOK's BAN

http://online.wsj.com/article/SB10001424052702304772804575558484075236968.html

"Many of the most popular applications, or "apps," on the social-networking site Facebook Inc. have been transmitting identifying information—in effect, providing access to people's names and, in some cases, their friends' names—to dozens of advertising and Internet tracking companies, a Wall Street Journal investigation has found.

The issue affects tens of millions of Facebook app users, including people who set their profiles to Facebook's strictest privacy settings. The practice breaks Facebook's rules, and renews questions about its ability to keep identifiable information about its users' activities secure."

They broke their rules before I joined, and they broke their own rules after they assured everyone else on Facebook and informed everyone of their strictest privacy setting.

Facebook also got members to nark on pedophiles, rather than changing security to include sending in or emailing ID like I did on one local dating site.

As well, they denied any responsibility when Facebook was used by criminals to scam other users, steal from them, and even didn't catch wind of the other capital offences committed by a few bad apples, probably despite a handful of complaints.

In my case, I was banned. Was it for posting partially nude pictures of people I don't know, heavily edited with the Gnu Image Manipulation Program (GIMP), usually by degrading the image to black and white and creatively blurring the pictures? Or for adding young people from Indonesia to help me rack up a high score at a Yazuka game Facebook runs? I really don't know.

The usual way to prevent banned users from signing up under a fake name to wreak revenge on the people who finked on them is to refuse to validate accounts associated with an email address and its associated IP address.

In my case, after receiving the email Facebook sent me which stated that I was banned due to complaints from other Facebook member, I indirectly admitted wrong-doing in reply. Within hours, I received the second email from them which stated that their decision stands and that their decision was final.

My response is documented in my blog entry for May 9, 2010, My Time on Facebook is Over.

After reading the article on Wall Street Journal, I feel vindicated for not returning to Facebook.

FWIW all my Facebook friends are spending time online they will never ever get back.

As for me, I'm getting out more often this winter to prevent SAD from turning me into a grumpy old man.

20070210

West Nile Virus & New Yorkers and Risk Novelty

"Most people are more afraid of risks that are new than those they've lived with for a while. In the summer of 1999, New Yorkers were extremely afraid of West Nile virus, a mosquito-borne infection that had never been seen in the United States. By the summer of 2001, though the virus continued to show up and make a few people sick, the fear had abated. The risk was still there, but New Yorkers had lived with it for a while. Their familiarity with it helped them see it differently. Most people are more afraid of risks that are new than those they've lived with for a while. In the summer of 1999, New Yorkers were extremely afraid of West Nile virus, a mosquito-borne infection that had never been seen in the United States. By the summer of 2001, though the virus continued to show up and make a few people sick, the fear had abated. The risk was still there, but New Yorkers had lived with it for a while. Their familiarity with it helped them see it differently. " - The Psychology of Security

In short, the novelty of risk posed by West Nile Virus was high in 1999. Within two years, NY people were education about WNV and realized that the risks were higher with small children and the elderly, whose immune system are compromised by age.

Likewise, when a criminal might pose a risk of threat to a community on immediate release of jail, it will take time to determine how large that risk is to vulnerable members of a community. As the years pass on, and the criminal still hasn't struck, then the community's fear will abate. If that criminal only victimizes only a few people, then there will not be as much fear and apprehension displayed 10 years after release when his rate of predation does not accelerate.

While the risk is there for a criminal to reoffend, if his rate of predation is low then most people in the community, having lived with it for 10 years, would realize how much of a threat he really is. Thus it serves the ex-criminal to become familiar with the community into which he is released to help members of that community see him differently (from a stranger to a friend).

This is why people are so shocked when an ex-convict strikes again after a lomg time without going back to his old ways, because it is assumed he was released because he was rehabilitated.